Sciweavers

292 search results - page 4 / 59
» Exploiting Dead Value Information
Sort
View
ISMVL
2006
IEEE
99views Hardware» more  ISMVL 2006»
14 years 1 months ago
Signal Processing Algorithms and Multiple-Valued Logic Design Methods
Multiple-valued logic can be viewed as an alternative approach to solving many problems in transmission, storage, and processing of large and even increasing amounts of informatio...
Jaakko Astola, Radomir S. Stankovic
ICISS
2010
Springer
13 years 5 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
BMCBI
2008
106views more  BMCBI 2008»
13 years 7 months ago
A machine vision system for automated non-invasive assessment of cell viability via dark field microscopy, wavelet feature selec
Background: Cell viability is one of the basic properties indicating the physiological state of the cell, thus, it has long been one of the major considerations in biotechnologica...
Ning Wei, Erwin Flaschel, Karl Friehs, Tim W. Natt...
NCA
2007
IEEE
13 years 7 months ago
A computational strategy exploiting genetic algorithms to recover color surface reflectance functions
—Information about the spectral reflectance of a color surface is useful in many applications. Assuming that reflectance functions can be adequately approximated by a linear comb...
Raimondo Schettini, Silvia Zuffi
WWW
2011
ACM
13 years 2 months ago
OXPath: little language, little memory, great value
Data about everything is readily available on the web—but often only accessible through elaborate user interactions. For automated decision support, extracting that data is esse...
Andrew Jon Sellers, Tim Furche, Georg Gottlob, Gio...